Integrity verification of replicated file with proxy in cloud computing

Enguang Zhou, Jiangxiao Zhang, Zhoujun Li*, Chang Xu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In 2013, Wang designed an efficient proxy provable data possession scheme. However, Wang’s scheme focuses on a single copy of the file and the client just delegates the integrity checking task to only one proxy, not multiple ones. In this paper, we extend Wang’s scheme to apply to multiple replicas. We propose two proxy multiple-replica provable data possession schemes. In the first scheme, the client delegates the integrity checking task to only one proxy. In the second scheme, multiple proxies form a group, and the client delegates the integrity checking task to this group. In the two proposed schemes, only the client and the proxy (proxies) can guarantee that multiple replicas are correctness. Finally, we analyze the security and performance of the two schemes.

Original languageEnglish
Title of host publicationCloud Computing and Big Data - 2nd International Conference, CloudCom-Asia 2015, Revised Selected Papers
EditorsChing-Hsien Hsu, Weizhong Qiang, Xianghan Zheng
PublisherSpringer Verlag
Pages344-353
Number of pages10
ISBN (Print)9783319284293
DOIs
Publication statusPublished - 2015
Event2nd International Conference on Cloud Computing and Big Data, CloudCom-Asia 2015 - Huangshan, China
Duration: 17 Jun 201519 Jun 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9106
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Conference on Cloud Computing and Big Data, CloudCom-Asia 2015
Country/TerritoryChina
CityHuangshan
Period17/06/1519/06/15

Keywords

  • Cloud computing
  • Cloud security
  • Data integrity
  • Multiple-replica

Fingerprint

Dive into the research topics of 'Integrity verification of replicated file with proxy in cloud computing'. Together they form a unique fingerprint.

Cite this